Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 44 of 44 (0.559 secs)
You searched for: subject:"decryption"
[image]3mliat fk atashfir
fk atashfir
Keywords: decryption
Downloads: 27
[image]najah fk atashfir
najah fk atashfir
Keywords: decryption
Downloads: 36
[texts]Efficiency of Entropy Coding as well as Dictionary based Technique for Lossless Data Compression - IJRDT
Communication is exchange of information between the devices, which very important in today's life. Communication is wide utilized in all fields, such as telephone, television, weather forecasting and etc. There are different kinds of communication techniques. All the data which have to be transmitted has to be compressed in order to send more and more data. Communication is one of the main processes in many domains, but to send the information, the data has to be compressed, so that more and mo...
Keywords: Entropy; Huffman coding; Encryption; Decryption
Downloads: 1
[texts]17. Eng Unique Information Based Secure RSA Neha Gupta - Neha Gupta, Ravi Kumar Gupta & Shipra Gupta
Computer security is one of the most important parameters considered in any computer system to prevent any data misuse by an unauthorized/ outside intrusion. Cryptography is one technique for data/ computer security. In this paper,           we have proposed a technique for a more secure data transfer which is a alteration to the classical public key crytogarphy method known as Unique Information Based Secure RSA...
Keywords: Cryptography; Public Key; Private Key; Encryption; Decryption
[texts]Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
This paper presents an algorithm which is hybrib ofTransposition and Substitution method.The main advantageof this approach is ,it doesn’t use any key from outside becausekey is present within the original message.Due to this themain problem of exchanging keys securely is solved.Both Transpositionand Substitution method have their own limitations.Sowe use both these method so that the resultant cipher is moresecure and strong.
Keywords: transposition; substitution; cipher; key; encryption; decryption
Downloads: 11
[texts]Evaluation of Performance Characteristics of Polynomial based and Lattice based NRTU Cryptosystem
In order to achieve the security for the e-businessapplication, generally, the organizations follow thecryptographic methods. The two widely accepted and usedcryptographic methods are symmetric and asymmetric. TheDES ideally belongs to the category of symmetric keycryptosystem and RSA, NTRU[3] belongs to the category ofasymmetric key cryptosystem. NTRU (Nth degree truncatedpolynomial ring units) is a collection of mathematicalalgorithms based on manipulating lists of very small integers.NTRU is ...
Keywords: Data Security; Encryption; Decryption; Polynomial; Matrix
Downloads: 17
[texts]In Re Decryption
Opinion denying forced decryption on 5th Amendment grounds
Keywords: Hanni Fakhoury; decryption; crypto; Fifth Amendment
Downloads: 58
[texts]BSTJ 60: 5. May-June 1981: B.S.T.J. Briefs: Fast Decryption Algorithm for the Knapsack Cryptographic System. (Henry, P.S.)
Bell System Technical Journal, 60: 5. May-June 1981 pp 767-773. B.S.T.J. Briefs: Fast Decryption Algorithm for the Knapsack Cryptographic System. (Henry, P.S.)
Keywords: knapsack; mod; decryption; algorithm; lookup; components; encrypted; cipher; successive; ieee; bell system; reduction mod; knapsack cipher; knapsack decryption; decryption algorithm; fast knapsack; system technical; lookup table
Downloads: 30
[texts]Enhancement of DES Algorithm with Multi State Logic - Payal Patel, Kruti Shah, Khushbu Shah
The principal goal to design any encryption algorithm must be the security against unauthorized access or attacks. Data Encryption Standard algorithm is a symmetric key algorithm and it is used to secure the data. Enhanced DES algorithm works on increasing the key length or complex S-BOX design or increased the number of states in which the information is to be represented or combination of above criteria...
Keywords: des; encryption; decryption; 10.7815/ijorcs.43.2014.084
[texts]37. Comp Sci Dual Congruent Yahia S. Al Halabi
Cryptography is one of the most important tools that provide hiding data and information security usually done through mathematical manipulation of the data with an incomprehensible format for unauthorized users. It has long beenused by government, public and private companies and militaries too to facilitate secret communication. Mainly,  it is commonly used within many kinds of civilian systems in protecting information...
Keywords: Cryptographic Algorithms; Cryptology; Cryptanalyst; Decryption; Encryption; Cipher; Protocol; Data Security
Downloads: 4
[texts]Image Encryption Using Advanced Hill Cipher Algorithm
The Hill cipher algorithm is one of the symmetric  key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, at  the time of decryption we need not to find the inverse of the key matrix...
Keywords: Encryption; Decryption; Hill Cipher; Image Encryption; Advanced Hill Cipher
Downloads: 304
[texts]A Data Hiding Techniques Based on Length of English Text using DES and Attacks - Sanjay Jadhav, Viddhulata Mohite
The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) ...
Keywords: Information hiding; DES; Encryption; Decryption; ijorcs; ijorcs.org
Downloads: 111
[texts]Why The DVD Hack Was A Cinch
Why The DVD Hack Was A Cinch November 2 1999
Keywords: dvd; decryption; encryption; DeCSS; recordable; encrypt; software; decss; key; windvd; unlock
Downloads: 8
[texts]A Probabilistic Approach towards the Prevention of Error Propagation Effect of AES and Realization Thereof
Error propagation effect of Advanced EncryptionStandard (AES) is a great research challenge. AES suffersfrom a major limitation of Error propagation effect. Inliterature, several studies have been made on this issue andseveral techniques are suggested to tackle the effect. To tacklethis limitation, two methods are available. One is RedundancyBased Technique and the other one is Bite Based ParityTechnique...
Keywords: AES; encryption; decryption; bit error; error propagation; majority rule; secured communication
Downloads: 7
[texts]King Exhibits Declaration Of Marsha King
King Exhibits Declaration Of Marsha King
Keywords: dvd; encryption; css; DeCSS; movies; decss; llps; internet; digital; copyright; decryption; encryption system; rose llps; dvd movies
Downloads: 8
[software]WinZip Self-Extractor - http://www.winzip.com/
WinZip Self-Extractor is a utility program that creates self-extracting Zip files so that you can easily transfer files to someone else without their needing to run a Zip program.
Keywords: WinZip Self-Extractor; System and utilities; File tools; Compression utilities; COMPRESS; COMPRESSION; DECOMPRESS; DECRYPT; DECRYPTION; DOWNLOAD; ENCRYPT; ENCRYPTION; FILE; FILE COMPRESSION; UNENCRYPT; UNENCRYPTION; UNZIP; UNZIPPING; ZIP; ZIP DOWNLOAD; ZIP FILE; ZIP FILES; ZIP PROGRAM; MIME; WINZIP; file compression. compression; compression; winzip self-extractor; zip; zip files; compression programs; z
Downloads: 552
[software]WinZip - http://www.winzip.com/
WinZip is the original ZIP file utility for Windows. It enables you to quickly compress and decompress files, folders and entire folder trees to save storage space and reduce e-mail transmission time. It will also encrypt and decrypt your sensitive documents. For those who are infrequent users of ZIP files, the Wizard interface provides simple, step-by-step guidance. For those who are comfortable with ZIP files, the WinZip Classic interface has everything you need...
Keywords: WinZip; System and utilities; File tools; Compression utilities; ENCRYPT; ENCRYPTION; DECRYPT; DECRYPTION; UNENCRYPT; UNENCRYPTION; DECOMPRESS; UNZIPPING; COMPRESSION; UNZIP; COMPRESS; ZIP; WINZIP; ZIP DOWNLOAD; ZIP FILES; FILE COMPRESSION; ZIP FILE; ZIP PROGRAM; FILE; DOWNLOAD; MIME; file compression. compression; winzip; zip; zip files; compression programs; compression utilities; zip pr
Downloads: 24,403 4.50 out of 5 stars4.50 out of 5 stars4.50 out of 5 stars4.50 out of 5 stars4.50 out of 5 stars(2 reviews)
[movies]Day 1 Part 11: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 267
[movies]Day 1 Part 16: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 295
[movies]Day 1 Part 15: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 254
[movies]Day 1 Part 14: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 261
[movies]Day 1 Part 13: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 285
[movies]Day 1 Part 3: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 397
[movies]Day 1 Part 12: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 272
[movies]Day 1 Part 5: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 301
[movies]Day 1 Part 6: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 288
[movies]Day 1 Part 9: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 267
[movies]Day 1 Part 4: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 323
[movies]Day 2 Part 7: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 305
[movies]Day 1 Part 8: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 264
[movies]Day 1 Part 10: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 299
[movies]Day 1 Part 17: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 276
[movies]Day 1 Part 18: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 258
[movies]Day 1 Part 2: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 398
[movies]Day 2 Part 1: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 326
[movies]Day 2 Part 4: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 340
[movies]Day 1 Part 1: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 643
[movies]Day 2 Part 6: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 279
[movies]Day 1 Part 19: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 242
[movies]Day 2 Part 5: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 278
[movies]Day 2 Part 3: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 324
[movies]Day 2 Part 2: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 362
[movies]Day 1 Part 7: Introduction to Trusted Computing - Ariel Segall
Class materials at http://OpenSecurityTraining.info/IntroToTrustedComputing.html Follow us on Twitter for class news @OpenSecTraining. This 2-day course by Ariel Segall is an introduction to the fundamental technologies behind Trusted Computing. You will learn what Trusted Platform Modules (TPMs) are and what capabilities they can provide both at an in-depth technical level and in an enterprise context...
Keywords: OpenSecurityTraining.info; Trusted Computing; TPM; Trusted Platform Module; Trusted Computing Group; trust; root of trust; root of trust for storage; root of trust for reporting; root of trust for measurement; static root of trust; SRTM; dynamic root of trust; DRTM; Platform Configuration Registers; PCR; PCRs; trusted hardware; cryptography; digital signatures; encryption; decryption; attestation; authentication; computer security class; computer; computers; security; computer security; cyber security; cybersecurity; host security; training; education; multi-day-class; multi-day-training; classes
Downloads: 286
[texts]August 2013: International Journal of Science and Research (IJSR) - International Journal of Science and Research (IJSR)
Volume 2 Issue 8, August 2013
Keywords: Guyuan city; Temperature change; Linear regression analysis; Mann-Kendall test; Pettitt jump test. Urine; Urinalysis; Proteinuria; Hematuria; Glycosuria; Pyuria. people-driven constitution; constitution-making process; Zimbabwe constitution model. Tool for restitution; Roman Imperial Baths; Architectural analysis; FPGA; RS-232 interface Stress; Coping Strategies; Employee Health; Performance Hoya kerrii; Micropropagation; 2; 4-D; Callus. FPGA; BIST; Analog model. Climate Change; LP-LFSR; Switching activity Paclitaxel; cervical carcinoma; HDR brachytherapy Plaintext; Cipher text; key length; block length Biceps brachii; third head; flap surgery; musculocutaneous nerve. precipitation; Land Surface Temperature; rainfall; interpolation; cross-validation; kriging; IDW. Denoising; Contrast Enhancement; Morphological Operations; Segmentation; Fuzzy C-Means Clustering. ICT literacy; Skill assessment; Land Use/ Land Cover Change; Computational tool; Computer competency. Biometrics; Signature; Back propagation; Artificial Neural Network. Kerala Model of Development; Health; Neo-liberalism; Privatization; Exclusion RCC building; Time history analysis; Normalized Difference Vegetation Index (NDVI) AzhalVaatham (Siddha Medical term); displacement; earthquake resistant design Agri-preneurs; Agricultural Entrepreneurs; Association; Government Subsidy ICT use; integration; management; public secondary; Bungoma; Kenya MANET; Neuropathy; Fuzzy logic; Black hole attack; Packet loss; Data rate. Pulverised nylon; Funtumia elastica; Brachystegia. kennedy; and Milicia excels Engine performance; Ignition timing; Exhaust emission; Twin plug SI engine. power electronic converter; Diabetes Mellitus (D.M); induction heating; simulation. Writing; Micro skills; Error; Error Analysis Full Duplex; Microcontroller; Wireless Monitoring System; Zigbee Database; Graphical User Interface (GUI); Information System; GlycyrrhizaglabraLinn; Rapid Application Design (RAD) Database; Graphical User Interface (GUI); Inventory System; Laboratory Touch screen; voice recognition; Home automation system; ZigBee communication. allometric growth; condition factor; Nangal dam. CAN (Controller Area Network); PIC16F877A; Cynodondactylon Linn. Nanofluids; Bluetooth. Color image; Edge suppression; Gradient field; affine transformation; Cross projection tensors; HUS; Enteric fever; Salmonella typhi. Information Technology; competence; university academic; Porous media; Internet; teaching. Epicondylitis; Manual Mobilization; NPRS Scale. Impact; Forage; Invasive plants; Conservation; Understory Business-to-Business; E-Business; E-Commerce; Effective thermal conductivity; E-Procurement; Internet; state corporations; Supply Chain. Electronic procurement; public sector procurement; e-procurement implementation. Noise; Spatial Domain Filtering; Filters; Image enhancement etc. Power line communication; Channel modeling; Impulse response; High speed data. Kenyan coal; Effective viscosity; Coal analysis; Coal rank and quality; Mui basin Codec; Container; H.261; H.261; MPEG-2. Parkinson’s disease; TUG test; Functional gait performance. Literacy; illiteracy; porosity; human development index; marginalisation Wavelet; Multiwavelet; Image denoising; Gaussian noise; Speckle noise linear filters; Wavelet transform. bagasse; boiler efficiency; Dryer; moisture contain Aspect; Permeability; Information retrieval; Opinion mining; Perspective; Tweets Classification; Computer Vision System; Image Processing; Grading; Quality; SVM; Wheat multi-dimensional visualization; Inertia coefficient. Aeromagnetic data; dimension reduction; visual clutter; visual structure Cloud computing; Broker Policy; Modeling and Simulation; Data Center; Resource management; Workload Based applications Cryptography; AES; DES; Spectral; FPGA; efficient encryption/decryption implementation; pipeline. ATM; wireless transmission; ITU-T; public and private Sting Stigma Eradication Application (SSEA); Short Messaging Service (SMS); Information Technology (IT); Antiretroviral Drug (ARV). Hydroxyapatite; Polyurethane; Mechanical properties; Depth; Morphological. e-commerce; malicious user; Sniffing; Spoofing; Brute-force; Cryptography & Decryption. e-commerce; CC Redbook; Mitigation Risk; OSSTMM; NIST Expression Recognition; Sedimentary depth; Image Processing; Local Feature; Pattern Recognition; CK+; JAFFE; Computer Vision chaos; logistic equation; price dynamics; discrete dynamical systems Wireless Sensor Network; Key Management Operations; first and second layer depth. Transfusion; Pre-shared Key (PSK); NchooseK Algorithm. Sexual Networking; Sexual Practices; Men Having Sex with Men (MSM); Level of Awareness on HIV/ AIDS Comprehensive health; Community health care; primary care; Doorstep service Opportunistic Routing Algorithm; WIFI Model; Packed Red blood cell; Blood usage; Blood groups; Road traffic accidents Pattern Recognition; Handwritten Character Recognition; K-Nearest Neighbor; Kannada vowels; Feature extraction; Chain code. Cloud; Public Cloud; Private Cloud; Hybrid Cloud; Federation of Cloud; Infrastructure as a Service (Iaas); Platform as a Service (Paas); Software as a Service (Saas). Virtualization; UEC; Eucalyptus; Secure Shell Login Boro silicate glass; density; optical basicity; optical absorption. Orchidaceae; Polystachya fusiformis; mycorrhiza; pollinia; herbivory. parallel counter design; high speed; state anticipation module. Foreign exchange; portfolio; disposable income; Gross Domestic Product Gender; Career; Counselling Cloud Computing; Cloud Security; Judicial policies; regulatory control Steganography. Cryptography; security; gif image; video Double layer steel dome; span to height ratio; IS 800-2007. video-capture; motion detection; short message service; video4linux; HTTP Universal; data processing; signals; communication; noise Information and communication technology; students’ achievement; chemistry at secondary level; country specific development. Networks; mathematical; physiological; sensor; detectors; ECG cochlear implants; hearing impaired; assistive device; handicap; communication paradigm; cultural differences; discrimination; identity; deaf culture. Artificial Intelligence; Webthrough; Ontologies; Semantics MPA; Wimax; DMB; HFSS. water environment capacity; one-dimensional model; lake; parameter; pollutant Background subtraction; DTBDM; Similarity module
Downloads: 884
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies
texts
image
software